CA2400223A1 - Validation protocol and system - Google Patents
Validation protocol and system Download PDFInfo
- Publication number
- CA2400223A1 CA2400223A1 CA002400223A CA2400223A CA2400223A1 CA 2400223 A1 CA2400223 A1 CA 2400223A1 CA 002400223 A CA002400223 A CA 002400223A CA 2400223 A CA2400223 A CA 2400223A CA 2400223 A1 CA2400223 A1 CA 2400223A1
- Authority
- CA
- Canada
- Prior art keywords
- chip
- random number
- function
- signature
- authentication chip
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
Abstract
This invention is a validation protocol for determining whether an untrusted authentication chip is valid, or not. In another aspect it concerns a validation system for the protocol. The protocol may be used to determine the physical presence of a valid authentication chip. In this case a system may call the trusted chip to generate a random number and a digital signature for it, encrypt them with a first key and then call a prove function in the untrusted chip. The prove function decrypts the random number and signature, and calculates another signature from the decrypted random number, for comparison with the decrypted one. If the comparison is successful the random number is encrypted with another key and sent back. Finally, a test function is called in the trusted chip to generate its own encrypted version of the random number using the second key and then compare it with the received version to validate the untrusted chip. The untrusted chip may be associated with a consumable so that validation of the untrusted chip authenticates the consumable.
Claims (20)
1. A validation protocol for determining whether an untrusted authentication chip is valid, or not, including the steps of:
generating a secret random number and calculating a signature for the random number using a signature function, in a trusted authentication chip;
encrypting the random number and the signature by a symmetric encryption function using a first key, in the trusted authentication chip;
passing the encrypted random number and signature from the trusted authentication chip to an untrusted authentication chip;
decrypting the encrypted random number and signature with a symmetric decryption function using the first key, in the untrusted authentication chip;
calculating a signature for the decrypted random number using the signature function, in the untrusted authentication chip;
comparing the signature calculated in the untrusted authentication chip with the signature decrypted;
in the event that the two signatures match, encrypting the decrypted random number by the symmetric encryption function using a second key and returning it to the trusted authentication chip;
encrypting the random number by the symmetric encryption function using the second key, in the trusted authentication chip;
comparing the two random numbers encrypted using the second key, in the trusted authentication chip;
in the event that the two random numbers encrypted using the second key match, considering the untrusted authentication chip to be valid;
otherwise considering the unfrosted authentication chip to be invalid.
generating a secret random number and calculating a signature for the random number using a signature function, in a trusted authentication chip;
encrypting the random number and the signature by a symmetric encryption function using a first key, in the trusted authentication chip;
passing the encrypted random number and signature from the trusted authentication chip to an untrusted authentication chip;
decrypting the encrypted random number and signature with a symmetric decryption function using the first key, in the untrusted authentication chip;
calculating a signature for the decrypted random number using the signature function, in the untrusted authentication chip;
comparing the signature calculated in the untrusted authentication chip with the signature decrypted;
in the event that the two signatures match, encrypting the decrypted random number by the symmetric encryption function using a second key and returning it to the trusted authentication chip;
encrypting the random number by the symmetric encryption function using the second key, in the trusted authentication chip;
comparing the two random numbers encrypted using the second key, in the trusted authentication chip;
in the event that the two random numbers encrypted using the second key match, considering the untrusted authentication chip to be valid;
otherwise considering the unfrosted authentication chip to be invalid.
2. The protocol according to claim 1, where the first and second keys are held in both the trusted and unfrosted authentication chips, and are kept secret.
3. The protocol according to claim 1, where the trusted authentication chip contains a random function to produce random numbers from a seed, and the function advances after each successful validation, so that the next random number will be produced from a new seed.
4. The protocol according to claim 1, where the symmetric decrypt function is held only in the unfrosted chip.
5. The protocol according to claim 1, where the signature function generates digital signatures of 160 bits.
6. The protocol according to claim 1, where a prove function is held only in the untrusted chip to test the decrypted random number and signature, and return the random number encrypted with the second key if a signature calculated from the decrypted random number matches the decrypted signature; otherwise it returns an indication the chip is invalid.
7.~The protocol according to claim 6, where the time taken to return an indication the chip is invalid is the same for all bad inputs, and the time taken to return the random number encrypted with the second key is the same for all good inputs.
8. ~The protocol according to claim 1, where a test function is held only in the trusted chip to advance the random number if the untrusted chip is valid; otherwise it returns an indication the chip is invalid.
9. ~The protocol according to claim 8, where the time taken to return an indication the chip is invalid is the same for all bad inputs, and the time taken to return an indication the chip is valid is the same for all good inputs.
10. ~The protocol according to claim 1, where it is used to determine the physical presence of a valid authentication chip.
11. ~A validation system for performing the method according to claim 1, where the system includes a trusted authentication chip and an untrusted authentication chip;
where the trusted authentication chip includes a random number generator, a symmetric encryption function and two keys for the function, a signature function and a test function; and the untrusted authentication chip includes a symmetric encryption and decryption function and two keys for these functions, a signature function, and a prove function to decrypt a random number and signature encrypted using the first key by the trusted authentication chip, and to calculate another signature from the decrypted random number, for comparison with the decrypted one, and in the event that the comparison is successful to encrypt the random number with the second key and send it back; the test function in the trusted chip then operates to generate an encrypted version of the random number using the second key and to compare it with the received version to validate the untrusted chip.
where the trusted authentication chip includes a random number generator, a symmetric encryption function and two keys for the function, a signature function and a test function; and the untrusted authentication chip includes a symmetric encryption and decryption function and two keys for these functions, a signature function, and a prove function to decrypt a random number and signature encrypted using the first key by the trusted authentication chip, and to calculate another signature from the decrypted random number, for comparison with the decrypted one, and in the event that the comparison is successful to encrypt the random number with the second key and send it back; the test function in the trusted chip then operates to generate an encrypted version of the random number using the second key and to compare it with the received version to validate the untrusted chip.
12. ~A validation system according to claim 11, where the remainder of the system is software, hardware or a combination of both, but the trusted chip is a physical authentication chip.
13. ~A validation system according to claim 11, where both chips have the same internal structure.
14. ~A validation system according to claim 11, where the first and second keys are kept secret.
15. ~A validation system according to claim 11, where the trusted authentication chip contains a random function to produce random numbers from a seed, and the function advances after each successful validation, so that the next random number will be produced from a new seed.
16. ~A validation system according to claim 11, where the signature function generates digital signatures of 160 bits.
17. ~A validation system according to claim 11, where the prove function returns an indication the chip is invalid for all bad inputs and the time taken to do this is the same for all bad inputs, and the time taken to return the random number encrypted with the second key is the same for all good inputs.
18. ~A validation system according to claim 11, where the test function advances the random number if the untrusted chip is validated.
19. ~A validation system according to claim 11, where the time taken for the test function to return an indication the chip not validated is the same for all bad inputs, and the time taken to return an indication that the chip is validated is the same for all good inputs.
20. A validation system according to claim 11, where it is used to determine the physical presence of a valid authentication chip.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/505,951 | 2000-02-15 | ||
US09/505,951 US7685423B1 (en) | 2000-02-15 | 2000-02-15 | Validation protocol and system |
PCT/AU2001/000141 WO2001061918A1 (en) | 2000-02-15 | 2001-02-15 | Validation protocol and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2400223A1 true CA2400223A1 (en) | 2001-08-23 |
CA2400223C CA2400223C (en) | 2011-05-03 |
Family
ID=24012546
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2400223A Expired - Fee Related CA2400223C (en) | 2000-02-15 | 2001-02-15 | Validation protocol and system |
Country Status (6)
Country | Link |
---|---|
US (4) | US7685423B1 (en) |
EP (1) | EP1260054B1 (en) |
AU (2) | AU3144301A (en) |
CA (1) | CA2400223C (en) |
SG (1) | SG127733A1 (en) |
WO (1) | WO2001061918A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7941661B2 (en) | 2000-02-15 | 2011-05-10 | Silverbrook Research Pty Ltd | Method of testing validity of authentication IC |
US7962767B2 (en) | 1997-07-15 | 2011-06-14 | Silverbrook Research Pty Ltd | Integrated circuit having obscured state change circuitry |
US8370260B2 (en) | 1997-07-15 | 2013-02-05 | Zamtec Ltd | Printing system for validating printing consumable |
Families Citing this family (69)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7685423B1 (en) * | 2000-02-15 | 2010-03-23 | Silverbrook Research Pty Ltd | Validation protocol and system |
US20050120217A1 (en) * | 2000-06-05 | 2005-06-02 | Reallegal, Llc | Apparatus, System, and Method for Electronically Signing Electronic Transcripts |
FR2821225B1 (en) * | 2001-02-20 | 2005-02-04 | Mobileway | REMOTE ELECTRONIC PAYMENT SYSTEM |
CN1672382B (en) * | 2002-07-26 | 2010-09-01 | 皇家飞利浦电子股份有限公司 | Secure authenticated distance measurement |
WO2004032411A1 (en) * | 2002-09-11 | 2004-04-15 | Giesecke & Devrient Gmbh | Protected cryptographic calculation |
US6996233B2 (en) * | 2003-06-19 | 2006-02-07 | International Business Machines Corporation | System and method for encrypting and verifying messages using three-phase encryption |
US7490237B1 (en) * | 2003-06-27 | 2009-02-10 | Microsoft Corporation | Systems and methods for caching in authentication systems |
US8862866B2 (en) | 2003-07-07 | 2014-10-14 | Certicom Corp. | Method and apparatus for providing an adaptable security level in an electronic communication |
KR100574945B1 (en) * | 2003-08-08 | 2006-04-28 | 삼성전자주식회사 | Method for implementing cryptographic engine of overlapping operation and variable clock operation |
US8245279B2 (en) | 2003-08-19 | 2012-08-14 | Certicom Corp. | Method and apparatus for synchronizing an adaptable security level in an electronic communication |
KR100546375B1 (en) * | 2003-08-29 | 2006-01-26 | 삼성전자주식회사 | Interdependent parallel processing hardware cryptographic engine providing for enhanced self fault-detecting and hardware encryption processing method thereof |
US7558954B2 (en) * | 2003-10-31 | 2009-07-07 | Hewlett-Packard Development Company, L.P. | Method and apparatus for ensuring the integrity of data |
US8165297B2 (en) | 2003-11-21 | 2012-04-24 | Finisar Corporation | Transceiver with controller for authentication |
US8099791B1 (en) | 2004-06-25 | 2012-01-17 | Lexmark International, Inc. | Method of authenticating a consumable in an imaging device |
FR2874144A1 (en) * | 2004-08-03 | 2006-02-10 | France Telecom | ANONYMOUS AUTHENTICATION METHOD BASED ON ASYMMETRIC TYPE CRYPTOGRAPHIC ALGORITHM |
US7574409B2 (en) * | 2004-11-04 | 2009-08-11 | Vericept Corporation | Method, apparatus, and system for clustering and classification |
US7450723B2 (en) * | 2004-11-12 | 2008-11-11 | International Business Machines Corporation | Method and system for providing for security in communication |
US7355527B2 (en) * | 2005-01-10 | 2008-04-08 | William Franklin | System and method for parking infraction detection |
JP2008541163A (en) * | 2005-05-11 | 2008-11-20 | エヌエックスピー ビー ヴィ | Communication protocol and telecommunications system, in particular authentication management system and corresponding method |
WO2007007690A1 (en) * | 2005-07-07 | 2007-01-18 | Kabushiki Kaisha Toshiba | Authentication system, device, and program |
US7870103B1 (en) * | 2005-10-13 | 2011-01-11 | Emc Corporation | Tolerating and reporting collisions in content-derived identifiers of data segments using secondary identifiers |
KR101006283B1 (en) | 2005-12-15 | 2011-01-06 | 인터내셔널 비지네스 머신즈 코포레이션 | Method and systems using radio frequency identifier tags for comparing and authenticating items |
WO2007073766A1 (en) * | 2005-12-29 | 2007-07-05 | Telecom Italia S.P.A. | A method for communicating entitlement data from a server, related server, client systems and computer program product |
US8171542B2 (en) * | 2006-02-13 | 2012-05-01 | Honeywell International Inc. | Advanced encryption standard to provide hardware key interface |
US7992194B2 (en) | 2006-03-14 | 2011-08-02 | International Business Machines Corporation | Methods and apparatus for identity and role management in communication networks |
US8135959B2 (en) * | 2006-04-07 | 2012-03-13 | Honeywell International Inc. | External key to provide protection to devices |
JP4911736B2 (en) | 2006-04-13 | 2012-04-04 | サーティコム コーポレーション | Method and apparatus for providing adaptive security levels in electronic communications |
US8935416B2 (en) * | 2006-04-21 | 2015-01-13 | Fortinet, Inc. | Method, apparatus, signals and medium for enforcing compliance with a policy on a client computer |
EP1868126B1 (en) * | 2006-06-16 | 2011-08-10 | Thomson Licensing | Device and method for discovering emulated clients |
US7602291B2 (en) * | 2006-09-14 | 2009-10-13 | Userstar Information System Co., Ltd. | Method and system for verifying authenticity of an object |
US8762714B2 (en) * | 2007-04-24 | 2014-06-24 | Finisar Corporation | Protecting against counterfeit electronics devices |
US9148286B2 (en) * | 2007-10-15 | 2015-09-29 | Finisar Corporation | Protecting against counterfeit electronic devices |
US20090240945A1 (en) * | 2007-11-02 | 2009-09-24 | Finisar Corporation | Anticounterfeiting means for optical communication components |
US8819423B2 (en) * | 2007-11-27 | 2014-08-26 | Finisar Corporation | Optical transceiver with vendor authentication |
EP2101302A1 (en) * | 2008-03-12 | 2009-09-16 | Userstar Information System Co., Ltd. | Method and system for verifying authenticity of an object |
US8051467B2 (en) | 2008-08-26 | 2011-11-01 | Atmel Corporation | Secure information processing |
US8789746B2 (en) * | 2009-01-31 | 2014-07-29 | Solexir Technology Inc. | Product authentication using integrated circuits |
US8713705B2 (en) * | 2009-08-03 | 2014-04-29 | Eisst Ltd. | Application authentication system and method |
CN102081727B (en) * | 2009-11-30 | 2014-04-30 | 中兴通讯股份有限公司 | Safety certificate method and system for radio frequency identification |
TW201212612A (en) * | 2010-09-07 | 2012-03-16 | Hon Hai Prec Ind Co Ltd | System and method for protecting keys |
WO2012120671A1 (en) * | 2011-03-09 | 2012-09-13 | 富士通株式会社 | Authentication system using symmetric-key cryptography |
US9129536B2 (en) | 2012-08-31 | 2015-09-08 | Freescale Semiconductor, Inc. | Circuit for secure provisioning in an untrusted environment |
US9100189B2 (en) | 2012-08-31 | 2015-08-04 | Freescale Semiconductor, Inc. | Secure provisioning in an untrusted environment |
US9100174B2 (en) | 2012-08-31 | 2015-08-04 | Freescale Semiconductor, Inc. | Secure provisioning in an untrusted environment |
US9094205B2 (en) | 2012-08-31 | 2015-07-28 | Freescale Semiconductor, Inc. | Secure provisioning in an untrusted environment |
US9323957B2 (en) * | 2013-03-01 | 2016-04-26 | Marvell World Trade Ltd. | Anti-tamper system based on dual random bits generators for integrated circuits |
US8873750B2 (en) | 2013-03-14 | 2014-10-28 | International Business Machines Corporation | Instruction for performing a pseudorandom number generate operation |
US9201629B2 (en) | 2013-03-14 | 2015-12-01 | International Business Machines Corporation | Instruction for performing a pseudorandom number seed operation |
DE102013207477A1 (en) * | 2013-04-24 | 2014-10-30 | Bundesdruckerei Gmbh | Carrying out a chip card function |
WO2014175900A1 (en) * | 2013-04-26 | 2014-10-30 | Hewlett-Packard Development Company, L.P. | Authentication utilizing encoded data |
PT3022059T (en) | 2013-08-30 | 2017-05-03 | Hewlett Packard Development Co Lp | Supply authentication via timing challenge response |
US9401905B1 (en) * | 2013-09-25 | 2016-07-26 | Emc Corporation | Transferring soft token authentication capabilities to a new device |
US10769315B2 (en) * | 2014-12-01 | 2020-09-08 | T-Mobile Usa, Inc. | Anti-theft recovery tool |
US9430658B2 (en) | 2014-12-16 | 2016-08-30 | Freescale Semiconductor, Inc. | Systems and methods for secure provisioning of production electronic circuits |
CN104780069B (en) * | 2015-04-16 | 2018-03-30 | 中国科学院计算技术研究所 | A kind of key-course towards SDN and data Layer communication port self-configuration method and its system |
CN104836668A (en) * | 2015-05-06 | 2015-08-12 | 东华大学 | Detection method for resistance of MD5 hash function against differential fault attack |
US20170186317A1 (en) | 2015-12-29 | 2017-06-29 | Tannery Creek Systems Inc. | System and Method for Determining Parking Infraction |
US10496814B2 (en) * | 2016-03-07 | 2019-12-03 | Intertrust Technologies Corporation | Software integrity checking systems and methods |
FR3054763B1 (en) * | 2016-07-29 | 2019-08-30 | Dover Europe Sarl | SYSTEM FOR ADVANCED PROTECTION OF CONSUMABLE OR DETACHABLE ELEMENTS OF INDUSTRIAL PRINTER |
CN106878015A (en) * | 2017-04-14 | 2017-06-20 | 江苏亨通问天量子信息研究院有限公司 | Encryption satellite communication system and method |
CN111183036B (en) | 2017-10-18 | 2021-07-13 | 惠普发展公司,有限责任合伙企业 | Integrated circuit device for replaceable printer components |
FR3076925B1 (en) * | 2018-01-16 | 2020-01-24 | Proton World International N.V. | CRYPTOGRAPHIC FUNCTION |
US20190042480A1 (en) * | 2018-02-05 | 2019-02-07 | Intel Corporation | Method for non-volatile memory and memory controller secured and authenticated pairing |
CN111726274B (en) * | 2020-05-25 | 2021-10-29 | 武汉理工大学 | Automobile CAN bus data communication method, equipment and storage medium |
US11764972B2 (en) | 2021-02-25 | 2023-09-19 | International Business Machines Corporation | Generating a hybrid security certificate using multiple cryptosystems |
CN116300356A (en) * | 2021-04-01 | 2023-06-23 | 珠海奔图电子有限公司 | Consumable chip, consumable, image forming apparatus, and communication method |
US20220382912A1 (en) * | 2021-06-01 | 2022-12-01 | Cisco Technology, Inc. | Using a trust anchor to verify an identity of an asic |
CN113346994A (en) * | 2021-06-24 | 2021-09-03 | 北京八分量信息科技有限公司 | Big data credibility verification method and system based on random sampling detection |
CN113671807A (en) * | 2021-08-13 | 2021-11-19 | 北京辰光融信技术有限公司 | USB consumable identification method for printer, consumable equipment and printer |
Family Cites Families (49)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4736423A (en) | 1985-04-30 | 1988-04-05 | International Business Machines Corporation | Technique for reducing RSA Crypto variable storage |
US4799061A (en) | 1985-11-18 | 1989-01-17 | International Business Machines Corporation | Secure component authentication system |
MX174467B (en) * | 1986-01-23 | 1994-05-17 | Squibb & Sons Inc | 1,4,7-TRISCARBOXIMETHYL-1,4,7,10-TETRAAZACICLODO DECAN SUBSTITUTE IN 1 AND ANALOG COMPOUNDS |
US5319710A (en) * | 1986-08-22 | 1994-06-07 | Tandem Computers Incorporated | Method and means for combining and managing personal verification and message authentication encrytions for network transmission |
JPH01114995A (en) | 1987-10-29 | 1989-05-08 | Toppan Printing Co Ltd | Identification card |
US4961088A (en) * | 1989-04-20 | 1990-10-02 | Xerox Corporation | Monitor/warranty system for electrostatographic reproducing machines using replaceable cartridges |
US5036461A (en) | 1990-05-16 | 1991-07-30 | Elliott John C | Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device |
DE69133502T2 (en) | 1990-06-01 | 2006-09-14 | Kabushiki Kaisha Toshiba, Kawasaki | Secret transmission method and device |
EP0504364B1 (en) * | 1990-08-29 | 1997-10-15 | Hughes Aircraft Company | Distributed user authentication protocol |
US5196840A (en) | 1990-11-05 | 1993-03-23 | International Business Machines Corporation | Secure communications system for remotely located computers |
JP2671649B2 (en) | 1991-07-08 | 1997-10-29 | 三菱電機株式会社 | Authentication method |
WO1993021711A1 (en) * | 1992-04-09 | 1993-10-28 | Siemens Aktiengesellschaft | Process for detecting unauthorised reinjection of data sent by a transmitter to a receiver |
JPH0764817A (en) * | 1993-08-30 | 1995-03-10 | Mitsubishi Electric Corp | Fault detection system |
IT1261605B (en) * | 1993-10-11 | 1996-05-23 | Olivetti & Co Spa | PRINTER WITH INTERCHANGEABLE PRINT HEADS |
US5475756A (en) * | 1994-02-17 | 1995-12-12 | At&T Corp. | Method of authenticating a terminal in a transaction execution system |
US5515441A (en) | 1994-05-12 | 1996-05-07 | At&T Corp. | Secure communication method and apparatus |
US5506905A (en) | 1994-06-10 | 1996-04-09 | Delco Electronics Corp. | Authentication method for keyless entry system |
CA2164536A1 (en) * | 1995-01-03 | 1996-07-04 | William G. Hawkins | Ink supply identification system |
US5619571A (en) | 1995-06-01 | 1997-04-08 | Sandstrom; Brent B. | Method for securely storing electronic records |
US5689565A (en) * | 1995-06-29 | 1997-11-18 | Microsoft Corporation | Cryptography system and method for providing cryptographic services for a computer application |
JP3541522B2 (en) | 1995-10-09 | 2004-07-14 | 松下電器産業株式会社 | Communication protection system and equipment between devices |
JP3363680B2 (en) * | 1995-12-28 | 2003-01-08 | ブラザー工業株式会社 | Cartridge authenticity discrimination method and output device using the same |
US6085320A (en) | 1996-05-15 | 2000-07-04 | Rsa Security Inc. | Client/server protocol for proving authenticity |
FR2749948B1 (en) * | 1996-06-13 | 1998-08-14 | Sagem | PRINTER ASSEMBLY AND CONSUMPTION TANK FOR OFFICE MACHINE |
US6073236A (en) | 1996-06-28 | 2000-06-06 | Sony Corporation | Authentication method, communication method, and information processing apparatus |
US5933652A (en) * | 1996-08-30 | 1999-08-03 | Advanced System Products, Inc. | Host independent peripheral controller with on-board firmware |
US5839119A (en) * | 1996-09-27 | 1998-11-17 | Xerox Corporation | Method of electronic payments that prevents double-spending |
US5956404A (en) * | 1996-09-30 | 1999-09-21 | Schneier; Bruce | Digital signature with auditing bits |
US6023509A (en) * | 1996-09-30 | 2000-02-08 | Intel Corporation | Digital signature purpose encoding |
US6005943A (en) | 1996-10-29 | 1999-12-21 | Lucent Technologies Inc. | Electronic identifiers for network terminal devices |
US6192473B1 (en) | 1996-12-24 | 2001-02-20 | Pitney Bowes Inc. | System and method for mutual authentication and secure communications between a postage security device and a meter server |
US6009173A (en) * | 1997-01-31 | 1999-12-28 | Motorola, Inc. | Encryption and decryption method and apparatus |
AUPO799197A0 (en) | 1997-07-15 | 1997-08-07 | Silverbrook Research Pty Ltd | Image processing method and apparatus (ART01) |
US5956051A (en) * | 1997-05-29 | 1999-09-21 | Pitney Bowes Inc. | Disabling a mailing machine when a print head is not installed |
US5971272A (en) | 1997-08-19 | 1999-10-26 | At&T Corp. | Secured personal identification number |
IL121640A (en) * | 1997-08-27 | 2000-06-01 | Scitex Corp Ltd | Ink cartridge |
US7039805B1 (en) * | 1998-05-20 | 2006-05-02 | Messing John H | Electronic signature method |
JPH11338982A (en) | 1998-05-25 | 1999-12-10 | Mitsubishi Electric Corp | Ic memory card system device and ic memory card therefor |
US6018291A (en) | 1998-06-04 | 2000-01-25 | Marble; Alan Dale | Motor vehicle anti-theft system by random problem simulation |
AU3841999A (en) | 1998-06-05 | 1999-12-30 | Landis & Gyr Communications Sarl | Preloaded ic-card and method for authenticating the same |
US6158850A (en) * | 1998-06-19 | 2000-12-12 | Lexmark International, Inc. | On carrier secondary ink tank with memory and flow control means |
US6816968B1 (en) * | 1998-07-10 | 2004-11-09 | Silverbrook Research Pty Ltd | Consumable authentication protocol and system |
US6243832B1 (en) * | 1998-08-12 | 2001-06-05 | Bell Atlantic Network Services, Inc. | Network access server testing system and methodology |
US6494562B1 (en) * | 1998-09-03 | 2002-12-17 | Hewlett-Packard Company | Method and apparatus for identifying a sales channel |
US5995774A (en) * | 1998-09-11 | 1999-11-30 | Lexmark International, Inc. | Method and apparatus for storing data in a non-volatile memory circuit mounted on a printer's process cartridge |
US6351538B1 (en) | 1998-10-06 | 2002-02-26 | Lsi Logic Corporation | Conditional access and copy protection scheme for MPEG encoded video data |
JP3755755B2 (en) * | 1999-07-14 | 2006-03-15 | セイコーエプソン株式会社 | An ink cartridge, an ink jet recording apparatus using the ink cartridge, and a method for determining whether an ink cartridge can be attached to the apparatus. |
US7243236B1 (en) * | 1999-07-29 | 2007-07-10 | Intertrust Technologies Corp. | Systems and methods for using cryptography to protect secure and insecure computing environments |
US7685423B1 (en) * | 2000-02-15 | 2010-03-23 | Silverbrook Research Pty Ltd | Validation protocol and system |
-
2000
- 2000-02-15 US US09/505,951 patent/US7685423B1/en not_active Expired - Fee Related
-
2001
- 2001-02-15 EP EP01903530.2A patent/EP1260054B1/en not_active Expired - Lifetime
- 2001-02-15 CA CA2400223A patent/CA2400223C/en not_active Expired - Fee Related
- 2001-02-15 SG SG200404561A patent/SG127733A1/en unknown
- 2001-02-15 WO PCT/AU2001/000141 patent/WO2001061918A1/en active IP Right Grant
- 2001-02-15 AU AU3144301A patent/AU3144301A/en active Pending
- 2001-02-15 US US10/203,559 patent/US20030159036A1/en not_active Abandoned
- 2001-02-15 AU AU2001231443A patent/AU2001231443B2/en not_active Ceased
-
2003
- 2003-08-08 US US10/636,283 patent/US7685424B2/en not_active Expired - Fee Related
-
2010
- 2010-02-21 US US12/709,493 patent/US20100153729A1/en not_active Abandoned
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7962767B2 (en) | 1997-07-15 | 2011-06-14 | Silverbrook Research Pty Ltd | Integrated circuit having obscured state change circuitry |
US8370260B2 (en) | 1997-07-15 | 2013-02-05 | Zamtec Ltd | Printing system for validating printing consumable |
US7941661B2 (en) | 2000-02-15 | 2011-05-10 | Silverbrook Research Pty Ltd | Method of testing validity of authentication IC |
Also Published As
Publication number | Publication date |
---|---|
US7685424B2 (en) | 2010-03-23 |
US7685423B1 (en) | 2010-03-23 |
WO2001061918A1 (en) | 2001-08-23 |
AU3144301A (en) | 2001-08-27 |
AU2001231443B2 (en) | 2004-02-19 |
US20030159036A1 (en) | 2003-08-21 |
SG127733A1 (en) | 2006-12-29 |
EP1260054B1 (en) | 2013-04-10 |
EP1260054A1 (en) | 2002-11-27 |
CA2400223C (en) | 2011-05-03 |
EP1260054A4 (en) | 2006-10-18 |
US20040049678A1 (en) | 2004-03-11 |
US20100153729A1 (en) | 2010-06-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2400223A1 (en) | Validation protocol and system | |
CA2400220A1 (en) | Consumable authentication protocol and system | |
US8130961B2 (en) | Method and system for client-server mutual authentication using event-based OTP | |
US6769060B1 (en) | Method of bilateral identity authentication | |
US6996712B1 (en) | Data authentication system employing encrypted integrity blocks | |
SG143962A1 (en) | Validating an authentication chip using a secret key | |
CN101369889B (en) | Method for electronic endorsement of document | |
CN110401615B (en) | Identity authentication method, device, equipment, system and readable storage medium | |
US8165286B2 (en) | Combination white box/black box cryptographic processes and apparatus | |
US20050166263A1 (en) | System and method providing disconnected authentication | |
RU2005104945A (en) | EFFECTIVE ENCRYPTION AND AUTHENTICATION FOR DATA PROCESSING SYSTEMS | |
US11853465B2 (en) | Securing data stored in a memory of an IoT device during a low power mode | |
JP7059282B6 (en) | Network devices and trusted third-party devices | |
CN112385175B (en) | Device for data encryption and integrity | |
JPH1028114A (en) | Work quantity reducing method, ciphering secret key supply method, cipher system executing method, ciphered message data structure and computer medium | |
JP2002232410A (en) | Equipment and method for communicating ciphered data | |
CN111222118A (en) | Certification information generation and query method based on alliance chain | |
WO2009153846A1 (en) | Authentication system, registration device, and authentication device | |
JP2002063139A (en) | Terminal equipment and server device and terminal authenticating method | |
KR20090048213A (en) | Method and apparatus for double encryption of data | |
JP4122164B2 (en) | One-way communication partner authentication protocol | |
CA2566253A1 (en) | System and method for protecting a password against brute force attacks | |
JP2003333034A (en) | Authenticated encryption method and apparatus, authenticated encryption program, memory medium having authenticated encryption program stored thereon, authenticated decryption method and apparatus, authenticated decryption program, and memory medium having authenticated decryption program stored thereon | |
JP2005217665A (en) | Communications system, transmitter, receiver and communication method | |
JP2001062128A (en) | Verification method of game machine, game machine, and verification device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |
Effective date: 20180215 |